Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Colleges | 7 |
Computer Security | 7 |
Information Security | 7 |
Higher Education | 4 |
Privacy | 4 |
Student Records | 3 |
College Administration | 2 |
Compliance (Legal) | 2 |
Confidentiality | 2 |
Crime Prevention | 2 |
Foreign Countries | 2 |
More ▼ |
Source
EDUCAUSE Review | 2 |
Association Supporting… | 1 |
Community College Journal | 1 |
Education and Information… | 1 |
International Journal of… | 1 |
ProQuest LLC | 1 |
Author
Arnon Hershkovitz | 1 |
Ashford, Tina | 1 |
Corn, Michael | 1 |
Eric G. Pardiñan | 1 |
Godfrey F. Mendes | 1 |
Jivulter C. Mangubat | 1 |
Lavagnino, Merri Beth | 1 |
Orly Lahav | 1 |
Patton, Madeline | 1 |
Ricson M. Bondad | 1 |
Rogers, Gary | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Two Year Colleges | 1 |
Audience
Location
Illinois | 1 |
Israel | 1 |
Kansas | 1 |
Philippines | 1 |
Rhode Island | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Arnon Hershkovitz; Orly Lahav – International Journal of Teaching and Learning in Higher Education, 2023
This article presents a study of a full-day, university-organized, online hackathon that aimed at designing solutions to problems raised in remote learning and teaching. The event, with about 80 participants, was carried out during the COVID-19 pandemic when many schools were closed and shifted to emergency remote teaching. The hackathon…
Descriptors: Electronic Learning, Computer Security, Information Security, COVID-19
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…
Descriptors: Computer Security, Crime, Victims, Higher Education
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning